Control #

F

2

.

2

Log technical misuse attempts and review prompt logs quarterly

Log prompts and completions related to technical misuse, including exploit code and abuse-enabling tactics. Conduct quarterly reviews to identify patterns and update defenses.

Evidence

We'll list specific evidence that demonstrates compliance with this control. Typically, this is screenshots, proof of a legal or operational policy, or product demonstrations.

Recommended actions

We'll recommend specific practices and actions for complying with this control.

Provide feedback on this control